RE: [PATCH 4/4] KVM: Device assignemnt with VT-d

2008-07-27 Thread Han, Weidong
Ben-Ami Yassour wrote:
> From: Kay, Allen M <[EMAIL PROTECTED]>
> 
> This patch includes the functions to support VT-d for passthrough
> devices.
> 
> [Ben: fixed memory pinning, cleanup]
> 
> Signed-off-by: Kay, Allen M <[EMAIL PROTECTED]>
> Signed-off-by: Weidong Han <[EMAIL PROTECTED]>
> Signed-off-by: Ben-Ami Yassour <[EMAIL PROTECTED]>
> ---
>  arch/x86/kvm/Makefile  |2 +-
>  arch/x86/kvm/vtd.c |  182
>   arch/x86/kvm/x86.c 
>  |   11 +++ include/asm-x86/kvm_host.h |3 +
>  include/linux/kvm_host.h   |6 ++
>  virt/kvm/kvm_main.c|8 ++-
>  6 files changed, 210 insertions(+), 2 deletions(-)
>  create mode 100644 arch/x86/kvm/vtd.c
> 
> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
> index 5b470a1..49c4ed3 100644
> --- a/virt/kvm/kvm_main.c
> +++ b/virt/kvm/kvm_main.c
> @@ -41,6 +41,7 @@
>  #include 
>  #include 
>  #include 
> +#include 
> 
>  #include 
>  #include 
> @@ -76,7 +77,7 @@ static inline int valid_vcpu(int n)
>   return likely(n >= 0 && n < KVM_MAX_VCPUS);
>  }
> 
> -static inline int is_mmio_pfn(pfn_t pfn)
> +inline int is_mmio_pfn(pfn_t pfn)
>  {
>   if (pfn_valid(pfn))
>   return PageReserved(pfn_to_page(pfn));

I cannot find this is_mmio_pfn() definition on main KVM tree, and failed
to patch it.

Randy (Weidong)



--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: Device Paravirtualization

2008-07-27 Thread Dave Waters
The second revision of PV NIC for Windows is on the KVM Source Forge site:

http://sourceforge.net/project/showfiles.php?group_id=180599

Dave Waters

-Original Message-
From: Sukanto Ghosh <[EMAIL PROTECTED]>
Sent: Monday, July 28, 2008 12:47 AM
To: kvm@vger.kernel.org
Subject: Device Paravirtualization

As device paravirtualization requires a modified device driver (PV
driver) in the guest, which is aware about the hypervisor, can this be
done for proprietary OSs by writing a device driver for them and then
installing it in the guest OS ?

If yes, has it been done for Windows guests so far ?

-- 
Regards,
Sukanto Ghosh
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0/9][RFC] KVM virtio_net performance

2008-07-27 Thread Mark McLoughlin
On Sun, 2008-07-27 at 09:17 -0400, Bill Davidsen wrote:
> Avi Kivity wrote:
> > Bill Davidsen wrote:
> >>
> >> I have been discussing this (on this list) in another thread. Putting 
> >> tcpdump on the eth0 device in the VM, the br0 device in the host, and 
> >> the eth0 (physical NIC) in the host, you can see that when the VM 
> >> generates a DHCP request it shows up on the br0 in the host, but 
> >> never gets sent on the wire by eth0.
> >>
> >> That's the point of failure, at least using RHEL5/FC6/kvm-66 as the 
> >> environment.
> >
> > Does playing with the bridge forward delay ('brctl setfd') help?
> >
> Update: Redhat has a user chain in iptables shared between INPUT and 
> FORWARD (bad idea) which doesn't pass bootp packets by default. 

Yeah, I've been trying to get that rule changed to allow all bridged
packets to be forwarded by default. See:

  https://bugzilla.redhat.com/221828

> Adding 
> the following rules to that table solved the DHCP for me.
> 
> ACCEPT udp  --  anywhere anywhereudp 
> spt:bootps dpt:bootpc
> ACCEPT udp  --  anywhere anywhereudp 
> spt:bootpc dpt:bootps
> 
> This seems to solve my problem, I just have to make it part of my "start 
> kvm" procedure.

See here:

  http://wiki.libvirt.org/page/Networking

in the 'Bridged networking (aka "shared physical device")' section:

  # echo "-I FORWARD -m physdev --physdev-is-bridged -j ACCEPT" > 
/etc/sysconfig/iptables-forward-bridged
  # lokkit --custom-rules=ipv4:filter:/etc/sysconfig/iptables-forward-bridged
  # service libvirtd reload

Cheers,
Mark.

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: How to run KVM on non-X environment

2008-07-27 Thread Thomas Mueller
On Mon, 28 Jul 2008 13:18:32 +0800, Stephen Liu wrote:


> 
> On running
> # kvm -m 750 -cdrom /dev/scd0 -boot d ubuntu6.06.img

add -vnc :

or disable graphics completly (see kvm --help)

- Thomas


--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: Device Paravirtualization

2008-07-27 Thread Sukanto Ghosh
Thanks Dave


On Mon, Jul 28, 2008 at 12:04 PM, Dave Waters <[EMAIL PROTECTED]> wrote:
> The second revision of PV NIC for Windows is on the KVM Source Forge site:
>
> http://sourceforge.net/project/showfiles.php?group_id=180599
>
> Dave Waters
>
> -Original Message-
> From: Sukanto Ghosh <[EMAIL PROTECTED]>
> Sent: Monday, July 28, 2008 12:47 AM
> To: kvm@vger.kernel.org
> Subject: Device Paravirtualization
>
> As device paravirtualization requires a modified device driver (PV
> driver) in the guest, which is aware about the hypervisor, can this be
> done for proprietary OSs by writing a device driver for them and then
> installing it in the guest OS ?
>
> If yes, has it been done for Windows guests so far ?
>
> --
> Regards,
> Sukanto Ghosh
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to [EMAIL PROTECTED]
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>
>



-- 
Regards,
Sukanto Ghosh
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ kvm-Bugs-2019608 ] Ubuntu 8.04.1 (IA32 && x86_64) - cannot install bootloader

2008-07-27 Thread SourceForge.net
Bugs item #2019608, was opened at 2008-07-16 15:03
Message generated for change (Comment added) made by awwy
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2019608&group_id=180599

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: intel
Group: None
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Johannes Truschnigg (c0l0)
Assigned to: Nobody/Anonymous (nobody)
Summary: Ubuntu 8.04.1 (IA32 && x86_64) - cannot install bootloader

Initial Comment:
CPU: Intel Core 2 Quad Q6600 (4 cores)
Distro, kernel: Gentoo GNU/Linux ~amd64, Kernel 2.6.25-r6
Bitness, compiler: x86_64, GCC 4.3.1
KVM versions: kvm-70, kvm-71

When trying to install Ubuntu) either 32bit or 64bit) in a KVM guest, 
grub-install croaks with. The guest kernel debug ringbuffer shows the following 
messages:

(Please see http://pasted.at/9d7e95f873.html or the attached file!)

Windows XP also hangs at installing, actually before anthing substantial other 
than copying installation files gets done. The first phase of the install 
completes, however - the "graphical installer" that's started after the first 
reboot hangs indefinitely.

Worked fine with version <= kvm-69 with the very same settings.

I'm happy to provide additional information upon request.

--

Comment By: Alexander Graf (awwy)
Date: 2008-07-28 06:34

Message:
Logged In: YES 
user_id=376328
Originator: NO

Ok this is SYSENTER, so things _should_ work actually:

The address we're faulting in is:

Pid: 1, comm: grub Not tainted 2.6.16.60-0.21-default #1
RIP: 0010:[<8011c8fc>] [<8011c8fc>]

Looking at the same address extended by 0x gives us:

(gdb) x /i 0x8011c8fc
0x8011c8fc :  swapgs 

when I break at the wrong address

(gdb) b *0x8011c8fc
Breakpoint 1 at 0x8011c8fc

The breakpoint jumps in in long mode:

(qemu) info registers 
RAX=0024 RBX=f7ee1ff4 RCX=fff985f0
RDX=0001
RSI= RDI=fff98674 RBP=fff985ac
RSP=
R8 = R9 = R10=
R11=0200
R12= R13= R14=
R15=
RIP=8011c8fc RFL=0022 [---] CPL=0 II=0 A20=1 SMM=0 HLT=0

but has this really weird IP. Shouldn't SYSENTER be completely handled by
VMX?

--

Comment By: Alexander Graf (awwy)
Date: 2008-07-25 11:53

Message:
Logged In: YES 
user_id=376328
Originator: NO

The address we're seeing the fault in actually belongs to SYSCALL. When I
remove the SYSCALL capability from the reportedly supported bits and run
the VM with -no-kvm, I receive #UD exceptions. Apparently something calls
SYSCALL even if it's not supported.

--

Comment By: Alexander Graf (awwy)
Date: 2008-07-24 13:36

Message:
Logged In: YES 
user_id=376328
Originator: NO

I bisected it down to commit cc91437d10770328d0b32f200399569a0ad22792,
which lies between kvm-60 and kvm-61. I can't really make out any obvious
problem that patch may rise though. Nevertheless it seems to be userspace
in fault here.


--

Comment By: Alexander Graf (awwy)
Date: 2008-07-24 05:56

Message:
Logged In: YES 
user_id=376328
Originator: NO

I am getting exactly the same error on SLES10 SP2. Running a 32-bit binary
in an x86_64 SLES10SP2 guest generates a #DF on a RIP, that looks like a
32-bit mangled kernel space address (80228ca0 vs.
80228ca0). Apparently something truncates it - I'll try to bisect.

--

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=893831&aid=2019608&group_id=180599
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 3/3] KVM: PIT: fix injection logic and count

2008-07-27 Thread Yang, Sheng
Hi Marcelo

Thanks for your work! It finally reslove my problem on failing to ack 
some injected interrupts. :)

On Sunday 27 July 2008 04:01:01 Marcelo Tosatti wrote:
> The PIT injection logic is problematic under the following cases:
>
> 1) If there is a higher priority vector to be delivered by the time
> kvm_pit_timer_intr_post is invoked ps->inject_pending won't be set.
> This opens the possibility for missing many PIT event injections
> (say if guest executes hlt at this point).

IRQ ack is of course the better way.

But I am still confuse about why PIT event lost. If higher priority 
vector there, it would inject first, but finally PIT one should be 
injected and because PIT inject one interrupt after another had been 
injected, so no PIT interrupt should be ignored.

>
> 2) ps->inject_pending is racy with more than two vcpus. Since
> there's no locking around read/dec of pt->pending, two vcpu's can
> inject two interrupts for a single pt->pending count.
>
> Fix 1 by using an irq ack notifier: only reinject when the previous
> irq has been acked. Fix 2 with appropriate locking around
> manipulation of pending count and irq_ack by the injection / ack
> paths.
>
> Also, count_load_time should be set at the time the count is
> reloaded, not when the interrupt is injected (BTW, LAPIC uses the
> same apparently broken scheme, could someone explain what was the
> reasoning behind that? kvm_apic_timer_intr_post).

PIT did so because we don't know how long we should wait for interrupt 
injection, so that point is nearer the real injection point. I think 
lapic have the similar reason.

I think keep timer_intr_post() for time update is reasonable.

--
regards
Yang, Sheng
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


How to run KVM on non-X environment

2008-07-27 Thread Stephen Liu
Hi folks,


Ubuntu 8.04 server amd64, headless
KVM 1:62+dfsg
QEMU 0.9.1
OpenSSH 1:4.7p1


On running
# kvm -m 750 -cdrom /dev/scd0 -boot d ubuntu6.06.img

 ===|  DirectFB 1.0.1  |===
  (c) 2001-2007  The DirectFB Organization (directfb.org)
  (c) 2000-2004  Convergence (integrated media) GmbH


(*) DirectFB/Core: Single Application Core. (2008-04-08 15:15) 
(*) Direct/Memcpy: Using libc memcpy()
(!) Direct/Util: opening '/dev/fb0' and '/dev/fb/0' failed
--> No such file or directory
(!) DirectFB/FBDev: Error opening framebuffer device!
(!) DirectFB/FBDev: Use 'fbdev' option or set FRAMEBUFFER environment
variable.
(!) DirectFB/Core: Could not initialize 'system' core!
--> Initialization error!
Could not initialize SDL - exiting


Please advise how to fix the problem.  TIA


B.R.
Stephen L

Send instant messages to your online friends http://uk.messenger.yahoo.com 
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Device Paravirtualization

2008-07-27 Thread Sukanto Ghosh
As device paravirtualization requires a modified device driver (PV
driver) in the guest, which is aware about the hypervisor, can this be
done for proprietary OSs by writing a device driver for them and then
installing it in the guest OS ?

If yes, has it been done for Windows guests so far ?

-- 
Regards,
Sukanto Ghosh
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 0/3] fix PIT injection

2008-07-27 Thread David S. Ahern
Hi Marcelo:

With kvm-72 + this patch set, timekeeping in RHEL3, RHEL4 and RHEL5
guests with 2 vcpus is much better. Approaching 5 hours of uptime and
all 3 guests are within 2 seconds of the host (part of the delta
measurement based). I'll let all 3 run overnight and then turn on ntp
tomorrow.

Thanks for working on this,

david


Marcelo Tosatti wrote:
> The in-kernel PIT emulation can either inject too many or too few
> interrupts.
> 
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: [ANNOUNCE] kvm-72 release

2008-07-27 Thread Xu, Jiajun
On Monday, July 28, 2008 11:11 AM [EMAIL PROTECTED] wrote:

> On Sun, Jul 27, 2008 at 7:11 PM, Xavier Gnata
> <[EMAIL PROTECTED]> wrote:
>> Hi,
>> 
>> kvm-72 does not compile with 2.6.26 kernels ( x86-64bits):
>> 
>> ./configure && make gives :
>> 
>> /usr/local/src/kvm-72/kernel/anon_inodes.c: In function
>> 'kvm_anon_inode_getfd':
>> /usr/local/src/kvm-72/kernel/anon_inodes.c:254: error: too many
>> arguments to function 'anon_inode_getfd' 
> 
> I'm having the exact same problem, using a 2.6.26 64-bit
> kernel as well.

The problem also exists with 2.6.26 32-bit kernel.


Best Regards
Jiajun
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [ANNOUNCE] kvm-72 release

2008-07-27 Thread Jorge Lucángeli Obes
On Sun, Jul 27, 2008 at 7:11 PM, Xavier Gnata <[EMAIL PROTECTED]> wrote:
> Hi,
>
> kvm-72 does not compile with 2.6.26 kernels ( x86-64bits):
>
> ./configure && make gives :
>
> /usr/local/src/kvm-72/kernel/anon_inodes.c: In function
> 'kvm_anon_inode_getfd':
> /usr/local/src/kvm-72/kernel/anon_inodes.c:254: error: too many arguments to
> function 'anon_inode_getfd'

I'm having the exact same problem, using a 2.6.26 64-bit kernel as well.

Cheers,
Jorge
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: e1000 and PXE issues

2008-07-27 Thread Greg Kurtzer
The default rtl8139 seems to work for me, but granted it doesn't
respond right away. It takes it about 8-10 seconds to figure stuff
out. Also the rtl8139 seems to only come up as half duplex for me (not
sure if that is related, but worth mentioning).

I just tested kvm-72, and that doesn't fix the bug (not a big surprise
considering there was nothing mentioned in the changelog regarding PXE
fixups) but worth noting.

Thanks everyone!

Greg



On Sun, Jul 27, 2008 at 10:32 AM, Farkas Levente <[EMAIL PROTECTED]> wrote:
> Greg Kurtzer wrote:
>>
>> On Sat, Jul 26, 2008 at 1:12 AM, Avi Kivity <[EMAIL PROTECTED]> wrote:
>>>
>>> Greg Kurtzer wrote:

 Hello,

 I noticed some problems with the e1000 implementation in kvm >= 70. At
 first glance it seemed liked a PXE problem as it would not acknowledge
 the DHCP offer from the server. I tried several different Etherboot
 ROM images and version 5.2.6 seemed to work. That version isn't PXE
 compliant so I built an ELF image to boot, and it downloaded it very,
 very, very, very slowly (as in about 10 minutes) but it did end up
 working.

 This all worked perfectly with version 69 and previous.

>>> There are two patches to e1000 in kvm-70; can you try backing them out
>>> (patch -Rp1 < test.patch) to see which one is guilty?
>>>
>>> Candidates attached.
>>
>> Reverted both of these patches yet the problem remains. :(
>>
>> This is easy to reproduce (at least on my build). if there is a DHCP
>> server on the network, just do a network boot on the e1000. It makes a
>> correct DHCPDISCOVER, but never responds to the DHCPOFFER (it should
>> do a DHCPREQUEST next). No packets are getting lost according tcpdump
>> on the master.
>>
>> The console is showing:
>>
>> Probing pci nic...
>> [e1000-82540em]Ethernet addr: 00:04:21:DE:99:55
>> Searching for server (DHCP)No IP address
>> .No IP address
>> .No IP address
>> .No IP address
>> .No IP address
>> .No IP address
>> .No IP address
>> ...
>
> the same happend with us both with e1000 and rtl8139 driver and the rh guy
> said it's not a virt-manager problem...
> currently we're not able to pxe boot any kind of kvm guest with any network
> driver:-(
>
> --
>  Levente   "Si vis pacem para bellum!"
>



-- 
Greg Kurtzer
http://www.infiscale.com/
http://www.runlevelzero.net/
http://www.perceus.org/
http://www.caoslinux.org/
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[RFC] LTTng merge plan

2008-07-27 Thread Mathieu Desnoyers
* Avi Kivity ([EMAIL PROTECTED]) wrote:
> Mathieu Desnoyers wrote:
>
>  
>>> Yes, but the userspace side would collect the format strings as well 
>>> (just once) and could put them in the same file.  The aggregation is 
>>> portable across kernel versions.
>>>
>>> 
>>
>> Yes,
>>
>> LTTng does exactly all that.
>>
>>
>>   
>
> [snip goodies]
>
>> I'll be more than happy to answer your questions.
>>   
>
> What's the merge plan for this?
>

Hi Avi,

Thanks for asking. Given the amount of expectation from kernel
developers, distributions and users I have seen for kernel tracing at
this year's OLS, I think giving a detailed merge plan for my LTTng work
is appropriate.

Currently, it looks like :

In Ingo's trees :
- Tracepoints, scheduler tracepoints instrumentation, ftrace port to
  tracepoints
  - Should make it into 2.6.27 since ftrace needs those.
- Immediate Values (faster branch based on load immediate instruction)
  Useful for markers and tracepoints, but can also be used for any
  compiled-in code that has to be dynamically enabled.
  - Aims at 2.6.28
- Text Edit Lock : protection of kernel text modification with a mutex.
  Synchronises kprobes and immediate values.
  - Aims at 2.6.28

Short-term submission plan

In LTTng patchset
(http://ltt.polymtl.ca/lttng/patch-2.6.26-0.12.tar.bz2)

- Instrumentation
  - LTTng tracepoints
- Used by LTTng, SystemTAP and usable specialized probes.
  - Port specific sets of tracepoints along with their current users
- ftrace (port currently in Ingo's tree), KVM trace, blktrace.

- Data extraction
  - LTTng timestamping
 - Based on the CPU cycle counter when synchronized across CPUs.
 - Fallback on a simple cache-bouncing atomic counter if no
   synchronized fast time source is available. Basically, the idea
   is that having the correct event _order_ is more important than
   having an approximate time, because this "timestamp" is used to
   reorder events which are written in per-CPU buffers. Time updates
   can always be recorded as an event in the trace to get an idea of
   the kernel time flow.
  - LTTng trace management
- netlink interface to start/stop tracing and set the buffer sizes.
  - Supports multiple channels (high/medium/low event rate).
Metadata (marker types, list of interrupt handlers...) can be
exported in low event rate channels.
  - Supports flight recorder mode (overwriting oldest buffer data),
normal mode (writes to disk, drops events if buffer is full) or
hybrid, or mixed, mode, where the high event rate buffers only
are in flight recorder mode.
  - Data relay
- Atomic buffering mechanism which does not call into kernel
  primitives except preempt disable. Only touches variables
  atomically, does not use any lock. Aims at having minimal
  intrusiveness and allowing the largest code coverage (thus not
  calling kernel code).
  - LTTng marker control
- Currently a /proc/ltt interface with read and write operations to
  list markers and connect LTTng probe to individual markers,
  specifying in which channel to send the data (I know, should
  probably belong to /sys instead, comments welcome) It's not part
  of the core marker infrastructure because it depends both on
  markers and on the LTTng trace management. It's also responsible
  for allocating a numeric ID to a marker which is guaranteed to be
  unique as long as there is at least one active trace.


Medium-term submission plan

In LTTng patchset

- Instrumentation
  - Userspace tracing interface
- Allow userspace to declare tracepoints and/or markers
- Provide a data extraction interface to collect the tracing data.
  - More work needed in this area.
  - LTTng statedump
- Exports the kernel data structures to the trace buffers at trace
  start. List interrupts, system calls, threads, memory maps, ... It
  does not use /proc because :
1 - /proc has nasty races which makes the information "generally
correct" but not more.
2 - /proc exports the information in text format, which is not
as compact as LTTng binary format.

Longer term wishlist
- GCC support for static branch patching
  - Improvement on the immediate values for dynamic code activation

A bit more information is available in the slides I just presented at
OLS at :

http://ltt.polymtl.ca/slides/desnoyers-talk-ols2008.pdf

I'll gladly answer to questions/comments.

Mathieu


-- 
Mathieu Desnoyers
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F  BA06 3F25 A8FE 3BAE 9A68
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: [RFC 1/2] Simulate Intel cpufreq MSRs in kvm guests to influencenice priority

2008-07-27 Thread Tian, Kevin
>From: Avi Kivity [mailto:[EMAIL PROTECTED] 
>Sent: 2008年7月27日 16:27
>
>Tian, Kevin wrote:
>>> From: Darrick J. Wong
>>> Sent: 2008年7月16日 7:18
>>>
>>> I envision four scenarios:
>>>
>>> 0. Guests that don't know about cpufreq still run at whatever 
>>> nice level
>>> they started with.
>>>
>>> 1. If we have a system with a lot of idle VMs, they will all 
>>> run with +5
>>> nice and this patch has no effect.
>>>
>>> 2. If we have a system with a lot of busy VMs, they all run 
>>> with -5 nice
>>> and this patch also has no effect.
>>>
>>> 3. If, however, we have a lot of idle VMs and a few busy 
>ones, then the
>>> -5 nice of the busy VMs will get those VMs extra CPU time.  
>On a really
>>> crummy FPU microbenchmark I have, the score goes from about 
>500 to 2000
>>> with the patch applied, though of course YMMV.  In some 
>respects this
>>> 
>>
>> How many VMs did you run in this test? All the VMs are idle except
>> the one where your benchmark runs?
>>
>> How about the actual effect when several VMs are doing some stuff?
>>
>> There's another scenario where some VMs don't support cpufreq while
>> others do. Here is it unfair to just renice the latter when 
>the former is
>> not 'nice' at all?
>>   
>
>I guess the solution for such issues is not to have kvm (or qemu) play
>with nice levels, but instead send notifications on virtual frequency
>changes on the qemu monitor. The management application can then choose
>whether to ignore the information, play with nice levels, or even
>propagate the frequency change to the host (useful in client-side
>virtualization).
>

Yes, that'd be more flexible and cleaner.

Thanks,
Kevin
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [ANNOUNCE] kvm-72 release

2008-07-27 Thread Henrik Holst
There is a boot regression in kvm-72:

scsi and virtio images will not survive a "reboot" from within the
guest. Only drives with if=ide survives a rebooting of the guest.

That is, this will create a guest that will survive any number of reboots:
qemu-system-x86_64 -M -drive file=a,if=ide,media=disk,boot=on -boot c

While this will only survive the first boot:
qemu-system-x86_64 -M -drive file=a,if=scsi,media=disk,boot=on -boot c OR
qemu-system-x86_64 -M -drive file=a,if=virtio,media=disk,boot=on -boot c


Also the extboot work done by H. Peter Anvin finally makes the newer
isolinux menus to work but the older isolinux (for example the
installer to ubuntu 7.10) still does not work. It no longer segfaults
though but instead the guest completely hangs. Much improvement
though!

/Henrik Holst
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [ANNOUNCE] kvm-72 release

2008-07-27 Thread Xavier Gnata

Hi,

kvm-72 does not compile with 2.6.26 kernels ( x86-64bits):

./configure && make gives :

/usr/local/src/kvm-72/kernel/anon_inodes.c: In function 
‘kvm_anon_inode_getfd’:
/usr/local/src/kvm-72/kernel/anon_inodes.c:254: error: too many 
arguments to function ‘anon_inode_getfd’


Were does this "int flag" come from ??

Xavier

The most noticeable change in this release, by far, is the removal of 
the QEMU/KVM annotation on the qemu window in favor of a new 'info 
kvm' monitor command.  If you dig deeper, you will see improved 
stability for Windows guests, especially x64 variants.


Changes from kvm-71:
- fix ia64 build breakage (Xiantao Zhang)
- ppc kvmtrace support (Christian Ehrhardt)
- merge qemu-svn
  - fixes suspend/resume of multiple nics
  - adds Virtual Distributed Ethernet (vde) support
- add 'push mem' to patched tpr instructions
- use host kernel anon_inodes support if available
- robustify signalfd() emulation
- avoid losing the iothread on random signals
- fix test for iothread (Jan Kiszka)
- remove hypercall device (Anthony Liguori)
- remove duplicate monitor command (Anthony Liguori)
- remove unused function declaration (Anthony Liguori)
- remove unnecessary change to TARGET_PAGE_SIZE (Anthony Liguori)
- remove qemu/kvm application decoration (Anthony Liguori)
- add 'info kvm' monitor command  (Anthony Liguori)
- s390 libkvm port (Carsten Otte)
- fix compile warning (Carlo Marcelo Arenas Belon)
- fix duplicate #include (Carlo Marcelo Arenas Belon)
- adjust external module for 2.6.27 hosts
- avoid tpr patching when the stack is not valid (Marcelo Tosatti)
  - fixes some variant of Windows 2003 SMP
- fix extboot stomping on reserved interrupt vectors (H. Peter Anvin)
- remove unused -translation option (Anthony Liguori)
- fix preemption during copy_from_user_inatomic() on older hosts
   (Andrea Arcangeli)
- fix ppc cpu initialization (Hollis Blanchard)
- drop shadow ptes on memslot destruction (Marcelo Tosatti)
- improve invalid shadow root page table handling (Marcelo Tosatti)
- simplify mmu page zapping
- simplify interrupt processing on Intel
- remove redundant check for real mode (Mohammed Gamal)
- add clflush emulation (Glauber Costa)
- fix race setting shadow ptes on i386
- consolidate pic isr clearing into a function
- consolidate exception interrupt vector #defines (Jan Kiszka)
- fix interrupt reinjection in real mode (Jan Kiszka)
- unify guest register save/restore code
- x86 hardware task switching fixes (Marcelo Tosatti)
- optimize vmx by avoiding saving the host stack pointer
- fix interrupts being delayed by instruction emulation
  - improves Vista stability
- fix reloading kvm-intel.ko while changing parameters (Sheng Yang)
- fix reboot exception entry build bug (Ingo Molnar)
- ignore no-op DEBUGCTL msr writes (Alexander Graf)
  - fixes Netware
- fix irq state leak on ia64 (Julia Lawall)
- s390 fixes (Carsten Otte, Christian Borntraeger, Martin Schwidefsky)
- ppc guest breakpoint support (Hollis Blanchard)
- optimize ppc by not saving host tlb state (Hollis Blanchard)
- reduce ppc guest tlb writes (Hollis Blanchard)
- avoid guest tlb flushes on guest privilege switches (Hollis Blanchard)


Notes:
If you use the modules bundled with kvm-72, you can use any version
of Linux from 2.6.16 upwards.  You may also use kvm-72 userspace with
the kvm modules provided by Linux 2.6.22 or above.  Some features may
only be available in newer releases.

http://kvm.qumranet.com




--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: e1000 and PXE issues

2008-07-27 Thread Farkas Levente

Greg Kurtzer wrote:

On Sat, Jul 26, 2008 at 1:12 AM, Avi Kivity <[EMAIL PROTECTED]> wrote:

Greg Kurtzer wrote:

Hello,

I noticed some problems with the e1000 implementation in kvm >= 70. At
first glance it seemed liked a PXE problem as it would not acknowledge
the DHCP offer from the server. I tried several different Etherboot
ROM images and version 5.2.6 seemed to work. That version isn't PXE
compliant so I built an ELF image to boot, and it downloaded it very,
very, very, very slowly (as in about 10 minutes) but it did end up
working.

This all worked perfectly with version 69 and previous.


There are two patches to e1000 in kvm-70; can you try backing them out
(patch -Rp1 < test.patch) to see which one is guilty?

Candidates attached.


Reverted both of these patches yet the problem remains. :(

This is easy to reproduce (at least on my build). if there is a DHCP
server on the network, just do a network boot on the e1000. It makes a
correct DHCPDISCOVER, but never responds to the DHCPOFFER (it should
do a DHCPREQUEST next). No packets are getting lost according tcpdump
on the master.

The console is showing:

Probing pci nic...
[e1000-82540em]Ethernet addr: 00:04:21:DE:99:55
Searching for server (DHCP)No IP address
.No IP address
.No IP address
.No IP address
.No IP address
.No IP address
.No IP address
...


the same happend with us both with e1000 and rtl8139 driver and the rh 
guy said it's not a virt-manager problem...
currently we're not able to pxe boot any kind of kvm guest with any 
network driver:-(


--
  Levente   "Si vis pacem para bellum!"
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [ANNOUNCE] kvm-72 release

2008-07-27 Thread Xavier Gnata

Avi Kivity wrote:
The most noticeable change in this release, by far, is the removal of 
the QEMU/KVM annotation on the qemu window in favor of a new 'info 
kvm' monitor command.  If you dig deeper, you will see improved 
stability for Windows guests, especially x64 variants.


Changes from kvm-71:
- fix ia64 build breakage (Xiantao Zhang)
- ppc kvmtrace support (Christian Ehrhardt)
- merge qemu-svn
  - fixes suspend/resume of multiple nics
  - adds Virtual Distributed Ethernet (vde) support
- add 'push mem' to patched tpr instructions
- use host kernel anon_inodes support if available
- robustify signalfd() emulation
- avoid losing the iothread on random signals
- fix test for iothread (Jan Kiszka)
- remove hypercall device (Anthony Liguori)
- remove duplicate monitor command (Anthony Liguori)
- remove unused function declaration (Anthony Liguori)
- remove unnecessary change to TARGET_PAGE_SIZE (Anthony Liguori)
- remove qemu/kvm application decoration (Anthony Liguori)
- add 'info kvm' monitor command  (Anthony Liguori)
- s390 libkvm port (Carsten Otte)
- fix compile warning (Carlo Marcelo Arenas Belon)
- fix duplicate #include (Carlo Marcelo Arenas Belon)
- adjust external module for 2.6.27 hosts
- avoid tpr patching when the stack is not valid (Marcelo Tosatti)
  - fixes some variant of Windows 2003 SMP
- fix extboot stomping on reserved interrupt vectors (H. Peter Anvin)
- remove unused -translation option (Anthony Liguori)
- fix preemption during copy_from_user_inatomic() on older hosts
   (Andrea Arcangeli)
- fix ppc cpu initialization (Hollis Blanchard)
- drop shadow ptes on memslot destruction (Marcelo Tosatti)
- improve invalid shadow root page table handling (Marcelo Tosatti)
- simplify mmu page zapping
- simplify interrupt processing on Intel
- remove redundant check for real mode (Mohammed Gamal)
- add clflush emulation (Glauber Costa)
- fix race setting shadow ptes on i386
- consolidate pic isr clearing into a function
- consolidate exception interrupt vector #defines (Jan Kiszka)
- fix interrupt reinjection in real mode (Jan Kiszka)
- unify guest register save/restore code
- x86 hardware task switching fixes (Marcelo Tosatti)
- optimize vmx by avoiding saving the host stack pointer
- fix interrupts being delayed by instruction emulation
  - improves Vista stability
- fix reloading kvm-intel.ko while changing parameters (Sheng Yang)
- fix reboot exception entry build bug (Ingo Molnar)
- ignore no-op DEBUGCTL msr writes (Alexander Graf)
  - fixes Netware
- fix irq state leak on ia64 (Julia Lawall)
- s390 fixes (Carsten Otte, Christian Borntraeger, Martin Schwidefsky)
- ppc guest breakpoint support (Hollis Blanchard)
- optimize ppc by not saving host tlb state (Hollis Blanchard)
- reduce ppc guest tlb writes (Hollis Blanchard)
- avoid guest tlb flushes on guest privilege switches (Hollis Blanchard)


Notes:
If you use the modules bundled with kvm-72, you can use any version
of Linux from 2.6.16 upwards.  You may also use kvm-72 userspace with
the kvm modules provided by Linux 2.6.22 or above.  Some features may
only be available in newer releases.

http://kvm.qumranet.com

It looks like the audio driver/card selection via ./configure is still 
broken. 
This set of patches does the job with kvm-71 :

"[PATCH 1/2] configure: include audio list options for --help output"
und
"[PATCH 0/2] configure: add support for audio-{drv,card}-list"


Xavier
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[ANNOUNCE] kvm-72 release

2008-07-27 Thread Avi Kivity
The most noticeable change in this release, by far, is the removal of 
the QEMU/KVM annotation on the qemu window in favor of a new 'info kvm' 
monitor command.  If you dig deeper, you will see improved stability for 
Windows guests, especially x64 variants.


Changes from kvm-71:
- fix ia64 build breakage (Xiantao Zhang)
- ppc kvmtrace support (Christian Ehrhardt)
- merge qemu-svn
  - fixes suspend/resume of multiple nics
  - adds Virtual Distributed Ethernet (vde) support
- add 'push mem' to patched tpr instructions
- use host kernel anon_inodes support if available
- robustify signalfd() emulation
- avoid losing the iothread on random signals
- fix test for iothread (Jan Kiszka)
- remove hypercall device (Anthony Liguori)
- remove duplicate monitor command (Anthony Liguori)
- remove unused function declaration (Anthony Liguori)
- remove unnecessary change to TARGET_PAGE_SIZE (Anthony Liguori)
- remove qemu/kvm application decoration (Anthony Liguori)
- add 'info kvm' monitor command  (Anthony Liguori)
- s390 libkvm port (Carsten Otte)
- fix compile warning (Carlo Marcelo Arenas Belon)
- fix duplicate #include (Carlo Marcelo Arenas Belon)
- adjust external module for 2.6.27 hosts
- avoid tpr patching when the stack is not valid (Marcelo Tosatti)
  - fixes some variant of Windows 2003 SMP
- fix extboot stomping on reserved interrupt vectors (H. Peter Anvin)
- remove unused -translation option (Anthony Liguori)
- fix preemption during copy_from_user_inatomic() on older hosts
   (Andrea Arcangeli)
- fix ppc cpu initialization (Hollis Blanchard)
- drop shadow ptes on memslot destruction (Marcelo Tosatti)
- improve invalid shadow root page table handling (Marcelo Tosatti)
- simplify mmu page zapping
- simplify interrupt processing on Intel
- remove redundant check for real mode (Mohammed Gamal)
- add clflush emulation (Glauber Costa)
- fix race setting shadow ptes on i386
- consolidate pic isr clearing into a function
- consolidate exception interrupt vector #defines (Jan Kiszka)
- fix interrupt reinjection in real mode (Jan Kiszka)
- unify guest register save/restore code
- x86 hardware task switching fixes (Marcelo Tosatti)
- optimize vmx by avoiding saving the host stack pointer
- fix interrupts being delayed by instruction emulation
  - improves Vista stability
- fix reloading kvm-intel.ko while changing parameters (Sheng Yang)
- fix reboot exception entry build bug (Ingo Molnar)
- ignore no-op DEBUGCTL msr writes (Alexander Graf)
  - fixes Netware
- fix irq state leak on ia64 (Julia Lawall)
- s390 fixes (Carsten Otte, Christian Borntraeger, Martin Schwidefsky)
- ppc guest breakpoint support (Hollis Blanchard)
- optimize ppc by not saving host tlb state (Hollis Blanchard)
- reduce ppc guest tlb writes (Hollis Blanchard)
- avoid guest tlb flushes on guest privilege switches (Hollis Blanchard)


Notes:
If you use the modules bundled with kvm-72, you can use any version
of Linux from 2.6.16 upwards.  You may also use kvm-72 userspace with
the kvm modules provided by Linux 2.6.22 or above.  Some features may
only be available in newer releases.

http://kvm.qumranet.com


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0/9][RFC] KVM virtio_net performance

2008-07-27 Thread Bill Davidsen

Avi Kivity wrote:

Bill Davidsen wrote:


I have been discussing this (on this list) in another thread. Putting 
tcpdump on the eth0 device in the VM, the br0 device in the host, and 
the eth0 (physical NIC) in the host, you can see that when the VM 
generates a DHCP request it shows up on the br0 in the host, but 
never gets sent on the wire by eth0.


That's the point of failure, at least using RHEL5/FC6/kvm-66 as the 
environment.


Does playing with the bridge forward delay ('brctl setfd') help?

Update: Redhat has a user chain in iptables shared between INPUT and 
FORWARD (bad idea) which doesn't pass bootp packets by default. Adding 
the following rules to that table solved the DHCP for me.


ACCEPT udp  --  anywhere anywhereudp 
spt:bootps dpt:bootpc
ACCEPT udp  --  anywhere anywhereudp 
spt:bootpc dpt:bootps


This seems to solve my problem, I just have to make it part of my "start 
kvm" procedure.


--
Bill Davidsen <[EMAIL PROTECTED]>
 "Woe unto the statesman who makes war without a reason that will still
 be valid when the war is over..." Otto von Bismark 



--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0/9][RFC] KVM virtio_net performance

2008-07-27 Thread Bill Davidsen

Avi Kivity wrote:

Bill Davidsen wrote:

Anthony Liguori wrote:

Hi Mark,

[...snip...]


I'm still seeing the same problem I saw with my patch series.  
Namely, dhclient fails to get a DHCP address.  Rusty noticed that RX 
has a lot more packets received then it should so we're suspicious 
that we're getting packet corruption.


I have been discussing this (on this list) in another thread. Putting 
tcpdump on the eth0 device in the VM, the br0 device in the host, and 
the eth0 (physical NIC) in the host, you can see that when the VM 
generates a DHCP request it shows up on the br0 in the host, but 
never gets sent on the wire by eth0.


That's the point of failure, at least using RHEL5/FC6/kvm-66 as the 
environment.


Does playing with the bridge forward delay ('brctl setfd') help?

Not obviously, default value is 15, stepping from 10..30 made no 
difference. It appears the bridge just doesn't forward DHCP packets. I'm 
not an expert on bridge setup, and I don't see an obvious control, so I 
will look at the code this afternoon and see if something jumps out at me.


--
Bill Davidsen <[EMAIL PROTECTED]>
 "Woe unto the statesman who makes war without a reason that will still
 be valid when the war is over..." Otto von Bismark 



--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[GIT PULL] KVM fixes for 2.6.27-rc

2008-07-27 Thread Avi Kivity
Linus, please pull from repo & branch at

  git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm.git kvm-updates-2.6.27

which contains fixes for 2.6.27's KVM.  These include an interrupt injection
fix, corrections for the universally admired x86 hardware task switching
mechanism, making unloading and reloading the vendor specific module
work while changing module parameters, and s390, ppc, and ia64 fixes.

Shortlog/diffstat follow.

Avi Kivity (1):
  KVM: Avoid instruction emulation when event delivery is pending

Carsten Otte (1):
  KVM: s390: Advertise KVM_CAP_USER_MEMORY

Christian Borntraeger (4):
  KVM: s390: Fix guest kconfig
  KVM: s390: Fix program check on interrupt delivery handling
  KVM: s390: Fix instruction naming for lctlg
  KVM: s390: Fix possible host kernel bug on lctl(g) handling

Hollis Blanchard (1):
  KVM: ppc: fix invalidation of large guest pages

Joerg Roedel (1):
  KVM: SVM: allow enabling/disabling NPT by reloading only the architecture 
module

Julia Lawall (1):
  KVM: ia64: Fix irq disabling leak in error handling code

Marcelo Tosatti (3):
  KVM: task switch: segment base is linear address
  KVM: task switch: use seg regs provided by subarch instead of reading 
from GDT
  KVM: task switch: translate guest segment limit to virt-extension byte 
granular field

Martin Schwidefsky (1):
  KVM: s390: Change guestaddr type in gaccess

Sheng Yang (2):
  KVM: VMX: Fix bypass_guest_pf enabling when disable EPT in module 
parameter
  KVM: VMX: Fix undefined beaviour of EPT after reload kvm-intel.ko

 arch/ia64/kvm/kvm-ia64.c  |5 +-
 arch/powerpc/kvm/44x_tlb.c|5 +-
 arch/powerpc/kvm/emulate.c|2 +-
 arch/s390/kvm/gaccess.h   |   62 ---
 arch/s390/kvm/intercept.c |   14 --
 arch/s390/kvm/interrupt.c |   21 +++-
 arch/s390/kvm/kvm-s390.c  |9 +++-
 arch/s390/kvm/sigp.c  |5 +-
 arch/x86/kvm/mmu.c|7 +++
 arch/x86/kvm/svm.c|   10 +++-
 arch/x86/kvm/vmx.c|   22 +
 arch/x86/kvm/x86.c|  109 -
 drivers/s390/kvm/Makefile |2 +-
 include/asm-powerpc/kvm_ppc.h |3 +-
 include/asm-s390/kvm_host.h   |4 +-
 include/asm-x86/kvm_host.h|1 +
 16 files changed, 143 insertions(+), 138 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [patch 0/4] Port KVM-trace to tracepoints -> LTTng ?

2008-07-27 Thread Avi Kivity

Mathieu Desnoyers wrote:

 

Yes, but the userspace side would collect the format strings as well (just 
once) and could put them in the same file.  The aggregation is portable 
across kernel versions.





Yes,

LTTng does exactly all that.


  


[snip goodies]


I'll be more than happy to answer your questions.
  


What's the merge plan for this?

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: [PATCH] Remove --disable-cpu-emulation (v2 -- sort of)

2008-07-27 Thread Zhang, Xiantao
Avi Kivity wrote:
> Anthony Liguori wrote:
>> This option was meant to be temporary until TCG was fixed on PowerPC
>> hosts.  It has been so let's get rid of it.  The only issue this
>> would introduce is that GCC 4 could no longer be used to build KVM
>> for PowerPC.  Hollis has switched to GCC 3.x for other reasons
>> though so this is not a big deal. 
>> 
>> This moves us closer to QEMU and gets rid of a bit of a wart.
>> 
>> I've compile tested this with powerpc and x86.
>> 
> 
> Xiantao, Carsten, are you okay with this?

As I know, there is no patch to fix TCG for ia64, so I am afraid that
ia64 also needs it now .  :(


> --
> error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


RE: [PATCH 01/04]Create x86 directory to hold x86-specific files.

2008-07-27 Thread Zhang, Xiantao
Avi Kivity wrote:
> Zhang, Xiantao wrote:
>> From c8c8c5a6b3ff943cb645f9ac4ef169490f14cd08 Mon Sep 17 00:00:00
>> 2001 From: Zhang Xiantao <[EMAIL PROTECTED]>
>> Date: Fri, 25 Jul 2008 16:50:30 +0800
>> Subject: [PATCH] KVM: external module: Moving x86-speicif files to
>> x86 directory. 
>> 
>> Create x86 directory to hold x86-specific files.
>> Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
>> 
> 
> You forgot to attach a patch; and your mailer corrupts patches, so I
> can't apply this.

Sorry. Attached! :)
> --
> error compiling committee.c: too many arguments to function



0001-KVM-external-module-Moving-x86-speicif-files-to-x8.patch
Description: 0001-KVM-external-module-Moving-x86-speicif-files-to-x8.patch


Re: [PATCH 2/2] Remove -tdf

2008-07-27 Thread Avi Kivity

Anthony Liguori wrote:


I think there's a healthy amount of scepticism  about whether tdf 
really is worth it.  This is why I suggested that we need to better 
quantify exactly how much this patch set helps things.  For instance, 
a time drift test for kvm-autotest would be perfect.


tdf is ugly and deviates from how hardware works.  A compelling case 
is needed to justify it.




On real hardware, the processor won't go away randomly for lengthy 
periods.  Since software assumes this, we must either provide a 
correction or live with guest time not corresponding to real time.


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: kexec/kdump of a kvm guest?

2008-07-27 Thread Avi Kivity

Mike Snitzer wrote:

Avi indicated he seems to remember that at least kexec worked last he
tried (didn't provide when/what he tried though).

  


kexec inside a guest.  Months ago.


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0 of 5] PowerPC patches for 2.6.27

2008-07-27 Thread Avi Kivity

Hollis Blanchard wrote:

Hi Avi, can these patches go upstream for 2.6.27? There's a bug fix,
the addition of hardware breakpoint functionality, and three very significant
performance improvements.

By the way, I will be on vacation for a few weeks starting Monday, but
Christian Ehrhardt should be able to take care of any technical issues.
  


Applied all; thanks.  I prefer to only merge bug fixes at this time for 
2.6.27.  As far as I can tell, patch 2 is independent of the rest so 
I'll queue that.  Let me know if that works.


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm-ppc" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: kexec/kdump of a kvm guest?

2008-07-27 Thread Avi Kivity

Vivek Goyal wrote:

Seems that libvirt functionality isn't available yet with kvm (I'm
using libvirt 0.4.2, I'll give libvirt 0.4.4 a try).  cc'ing the
libvirt-list to get their insight.

That aside, having the crash dump collection be multi-phased really
isn't workable (that is if it requires a crashed guest to be manually
saved after the fact).  The host system _could_ be rebooted; whereby
losing the guest's core image.  So automating qemu and/or libvirtd to
trigger a dump would seem worthwhile (maybe its already done?).




That's a good point. Ideally, one would like dump to be captured
automatically if kernel crashes and then reboot back to production
kernel. I am not sure what can we do to let qemu know after crash
so that it can automatically save dump.
  


We can expose a virtual pci device that when accessed, causes qemu to 
dump the guest's core.




Ok. So first task is to fix host kexec/kdump with kvm-intel module
inserted.

Can you do little debugging to find out where system hangs. I generally
try few things for kexec related issue debugging.

1. Specify earlyprintk= parameter for second kernel and see if control
   is reaching to second kernel.

2. Otherwise specify --console-serial parameter on "kexec -l" commandline
   and it should display a message "I am in purgatory" on serial console.
   This will just mean that control has reached at least till purgatory.

3. If that also does not work, then most likely first kernel itself got
   stuck somewhere and we need to put some printks in first kernel to find
   out what's wrong.

  


kvm has a reboot notifier to turn off vmx when rebooting.  See 
kvm_reboot_notifier and kvm_reboot().  Maybe something similar is needed 
for kexec?


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC 1/2] Simulate Intel cpufreq MSRs in kvm guests to influencenice priority

2008-07-27 Thread Avi Kivity
Tian, Kevin wrote:
>> From: Darrick J. Wong
>> Sent: 2008年7月16日 7:18
>>
>> I envision four scenarios:
>>
>> 0. Guests that don't know about cpufreq still run at whatever 
>> nice level
>> they started with.
>>
>> 1. If we have a system with a lot of idle VMs, they will all 
>> run with +5
>> nice and this patch has no effect.
>>
>> 2. If we have a system with a lot of busy VMs, they all run 
>> with -5 nice
>> and this patch also has no effect.
>>
>> 3. If, however, we have a lot of idle VMs and a few busy ones, then the
>> -5 nice of the busy VMs will get those VMs extra CPU time.  On a really
>> crummy FPU microbenchmark I have, the score goes from about 500 to 2000
>> with the patch applied, though of course YMMV.  In some respects this
>> 
>
> How many VMs did you run in this test? All the VMs are idle except
> the one where your benchmark runs?
>
> How about the actual effect when several VMs are doing some stuff?
>
> There's another scenario where some VMs don't support cpufreq while
> others do. Here is it unfair to just renice the latter when the former is
> not 'nice' at all?
>   

I guess the solution for such issues is not to have kvm (or qemu) play
with nice levels, but instead send notifications on virtual frequency
changes on the qemu monitor. The management application can then choose
whether to ignore the information, play with nice levels, or even
propagate the frequency change to the host (useful in client-side
virtualization).

-- 
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] kvm-userspace: fix memslot assignment

2008-07-27 Thread Avi Kivity

Christian Borntraeger wrote:

Hello Avi,

seems that I mixed up the slot initialization, instead of making the first 
slot always 0 I made it always 1. Lets go back to Carstens variant, since I 
dont like nested ifdefs. The compiler will remove the dead code anyway.


Signed-off-by: Christian Borntraeger <[EMAIL PROTECTED]>

---
 libkvm.c |7 +--
 1 file changed, 5 insertions(+), 2 deletions(-)

Index: libkvm/libkvm.c
===
--- libkvm.orig/libkvm.c
+++ libkvm/libkvm.c
@@ -78,7 +78,7 @@ int get_free_slot(kvm_context_t kvm)
int i;
int tss_ext;
 
-#if defined(KVM_CAP_SET_TSS_ADDR) && !defined(__s390__)

+#if defined(KVM_CAP_SET_TSS_ADDR)
tss_ext = ioctl(kvm->fd, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR);
 #else
tss_ext = 0;
  


This is really a no-op, since s390 will nack a KVM_CAP_SET_TSS_ADDR 
query.  Of course, the change is an improvement.



@@ -92,8 +92,11 @@ int get_free_slot(kvm_context_t kvm)
if (tss_ext > 0)
i = 0;
else
+#if !defined(__s390__)
i = 1;
-
+#else
+   i = 0;
+#endif
  


ppc and ia64 also don't care about TSS_ADDR.  Care to make this depend 
on x86, rather than on s390?


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH] Remove --disable-cpu-emulation (v2 -- sort of)

2008-07-27 Thread Avi Kivity

Anthony Liguori wrote:

This option was meant to be temporary until TCG was fixed on PowerPC hosts.  It
has been so let's get rid of it.  The only issue this would introduce is that
GCC 4 could no longer be used to build KVM for PowerPC.  Hollis has switched to
GCC 3.x for other reasons though so this is not a big deal.

This moves us closer to QEMU and gets rid of a bit of a wart.

I've compile tested this with powerpc and x86.
  


Xiantao, Carsten, are you okay with this?

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 2/2] Remove -tdf

2008-07-27 Thread Avi Kivity

Anthony Liguori wrote:

The last time I posted the KVM patch series to qemu-devel, the -tdf patch met 
with
some opposition.  Since today we implement timer catch-up in the in-kernel PIT 
and
the in-kernel PIT is used by default, it doesn't seem all that valuable to have
timer catch-up in userspace too.

Removing it will reduce our divergence from QEMU.

  


I'd rather see the feature added to qemu (in the form of Gleb's irq 
notifications) rather than removed.


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 1/2] Fix bad merge

2008-07-27 Thread Avi Kivity

Anthony Liguori wrote:

This option no longer exists.
  



Applied, thanks.

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0/2] Paravirt loops per jiffy calculation

2008-07-27 Thread Avi Kivity

Glauber Costa wrote:

Hey,

Over the last weeks, there has been some discussion regarding paravirt
lpj calculation for kvm. Here's my shot at that.

KVM hypervisor already put the right value in our pvclock structures,
as part of the xen compatibility efforts.

So the first patch moves the respective xen code to pvclock.c (since
we'll be doing the same calculation anyway), while the second, implements
functions for kvm that makes use of it.

Turns out that only implementing a pv get_tsc_khz is not enough, since
it will only do the right thing for cpu0, which is not what we desire.

So we set preset_lpj. Recall this code is run before arch parameter setup,
so if we pass lpj=xx in the command line, it'll still work.

Have a good (paravirtual) time!

  


I only have this email out of the patchset.  Please resend.


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0/9][RFC] KVM virtio_net performance

2008-07-27 Thread Avi Kivity

Bill Davidsen wrote:

Anthony Liguori wrote:

Hi Mark,

Mark McLoughlin wrote:

Hey,
  Here's a bunch of patches attempting to improve the performance
of virtio_net. This is more an RFC rather than a patch submission
since, as can be seen below, not all patches actually improve the
perfomance measurably.
  


I'm still seeing the same problem I saw with my patch series.  
Namely, dhclient fails to get a DHCP address.  Rusty noticed that RX 
has a lot more packets received then it should so we're suspicious 
that we're getting packet corruption.


I have been discussing this (on this list) in another thread. Putting 
tcpdump on the eth0 device in the VM, the br0 device in the host, and 
the eth0 (physical NIC) in the host, you can see that when the VM 
generates a DHCP request it shows up on the br0 in the host, but never 
gets sent on the wire by eth0.


That's the point of failure, at least using RHEL5/FC6/kvm-66 as the 
environment.


Does playing with the bridge forward delay ('brctl setfd') help?

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 0/6] kvm-s390: Multiple fixes for kvm on s390

2008-07-27 Thread Avi Kivity

Christian Borntraeger wrote:

Hello Avi,

here is a number of fixes and changes to the kvm on s390 port. This 
also includes the resend of the Kconfig patch. The patch desription has an

additional comment dealing with your comment.

I think all patches are ok for 2.6.27. Patches 4 and 6 are fixing potential 
host BUGs.


1. Advertise KVM_CAP_USER_MEMORY
2. Fix guest kconfig
3. Change guestaddr type in gaccess
4. Fix program check on interrupt delivery handling
5. Fix instruction naming for lctlg
6. Fix possible host kernel bug on lctl(g) handling


  


Applied all, thanks.

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [PATCH 01/04]Create x86 directory to hold x86-specific files.

2008-07-27 Thread Avi Kivity

Zhang, Xiantao wrote:

From c8c8c5a6b3ff943cb645f9ac4ef169490f14cd08 Mon Sep 17 00:00:00 2001
From: Zhang Xiantao <[EMAIL PROTECTED]>
Date: Fri, 25 Jul 2008 16:50:30 +0800
Subject: [PATCH] KVM: external module: Moving x86-speicif files to x86
directory.

Create x86 directory to hold x86-specific files.
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
  


You forgot to attach a patch; and your mailer corrupts patches, so I 
can't apply this.


--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html